CTU Blog

SEARCH THE BLOG

Archives

Content Type

Content Category

Latest Posts

The United States does not yet have a national strategy to deal with cybersecurity; cyber law is undeveloped, and while narrow segments of expertise exist inside and outside of government, broad understanding of the threat and what we might do to prepare for, recovery from, and respond to cyber attacks is woefully lacking.

The advice of fiction writers such as Stephen King and Robert A. Heinlein has helped me hone my craft. I learn from the purveyors of the craft who have come before me. Books such as On Writing have caused me to reflect upon the life experiences that make me the writer I am.

Higher education has been a great point of debate throughout this presidential election season. Much can be learned from the platforms of both President Barack Obama and Mitt Romney and their collective approach to ensuring that Americans have high quality and accessible means to personal and professional development.

The highlight of the conference was Professor Edward Burger’s keynote address entitled, “The 5 Elements of Effective Thinking.” A captivating speaker, Dr. Burger creatively outlined these five elements of effective—or innovative—thinking, which he linked to the four basic earthly elements which predate Socrates: Earth, Fire, Air, and Water.

I recently returned from a planning conference associated with Exercise Angel Thunder 2013. AT-13, and its Defense Support of Civil Authorities segment (Resolute Angel) are played on an 18-month cycle to exercise local, state, federal, and multinational civil and military agencies in disaster response and – particularly for the military forces – personnel recovery in simulated earthquake and combat scenarios.

Today, as many as 92% of employers and recruiters use social networks to find job candidates – yet only 38% of job seekers report regular use of LinkedIn to find work. With the candidate pool growing more homogeneous and the hiring process almost entirely digital, there’s really no denying that a professional presence online is critical to career success.

An entrepreneur is an enlightened renegade who refuses to kow-tow to conventional wisdom and is always willing to bet what they have to get what they want. Entrepreneurs tend to be radicals on a mission to sate a deep-seated passion; an obsessive Promethean (Intuitive-Thinker) willing to sacrifice all for the redemption of a dream. And strange as it may seem, an entrepreneur tends to leap before they look.

There is a tremendous diversity to the threats in the cyber domain and the entities that are behind them. Let’s take a closer look at the individuals responsible for the various threats threatening our cybersecurity.

The key to beginning your education, despite the curve balls life will throw, is finding the right balance between organization and time management. These skills are critical to ensuring you can get through these difficult times with your best foot forward.

The MBA is designed to equip the individual with an overall core knowledge of business, with courses in finance, economics, marketing, accounting, strategy and leadership. The MS, on the other hand, offers deep dives into coursework that is aligned with a specialized, or more directed career path.

In recognition of Cybersecurity Awareness month in October, our faculty offer insights on both policy and technical issues related to cybersecurity. In our second post of the series, Bruce Harmon, Ph.D., took a look at the defining terminology making its way into our culture. In today’s post, Stephen Recca, M.A., takes a look at four cybersecurity threats from a policy perspective.

CTU’s Global Security Series offers background on current national and homeland security topics. Dr. Morag recently participated in the Eastern Accord 2012 Counter Violent Extremism Exercise in Arusha, Tanzania. His second post in this series looked at primary security threats from the trans-national and global Jihadist groups operating in the region. Today’s post will focus on some of the economic and social challenges facing Djibouti, Uganda, Tanzania and Zambia.

These days, everyone is vulnerable to cybercrime and other breaches to the security of their digital systems and identity. Our world is increasingly connected through computers, smart phones and tablets and an exploding number of apps. This influx of technology makes for that many more digital portals to protect.